Which of the following should the security team recommend FIRST?

A university issues badges through a homegrown identity management system to all staff and students. Each week during the summer, temporary summer school students arrive and need to be issued a badge to access minimal campus resources. The security team received a report from an outside auditor indicating the homegrown...

March 18, 2024 No Comments READ MORE +

Which of the following should be implemented to BEST manage the risk?

The Chief information Officer (CIO) of a large bank, which uses multiple third-party organizations to deliver a service, is concerned about the handling and security of customer data by the parties. Which of the following should be implemented to BEST manage the risk?A . Establish a review committee that assesses...

March 18, 2024 No Comments READ MORE +

Which of the following solutions should the security architect recommend?

A company has hired a security architect to address several service outages on the endpoints due to new malware. The Chief Executive Officer’s laptop was impacted while working from home. The goal is to prevent further endpoint disruption. The edge network is protected by a web proxy. Which of the...

March 18, 2024 No Comments READ MORE +

Which of the following response actions should the analyst take FIRST?

A security analyst notices a number of SIEM events that show the following activity: Which of the following response actions should the analyst take FIRST?A . Disable powershell.exe on all Microsoft Windows endpoints.B . Restart Microsoft Windows Defender.C . Configure the forward proxy to block 40.90.23.154.D . Disable local administrator...

March 18, 2024 No Comments READ MORE +

Which of the following phases establishes the identification and prioritization of critical systems and functions?

An organization is referencing NIST best practices for BCP creation while reviewing current internal organizational processes for mission-essential items. Which of the following phases establishes the identification and prioritization of critical systems and functions?A . Review a recent gap analysis.B . Perform a cost-benefit analysis.C . Conduct a business impact...

March 18, 2024 No Comments READ MORE +

Which of the following must the company do to ensure GDPR compliance?

A company is preparing to deploy a global service. Which of the following must the company do to ensure GDPR compliance? (Choose two.)A . Inform users regarding what data is stored.B . Provide opt-in/out for marketing messages.C . Provide data deletion capabilities.D . Provide optional data encryption.E . Grant data...

March 17, 2024 No Comments READ MORE +

Which of the following SCAP standards, when combined, will enable the organization to view each of the configuration checks in a machine-readable checklist format for fill automation?

An organization wants to perform a scan of all its systems against best practice security configurations. Which of the following SCAP standards, when combined, will enable the organization to view each of the configuration checks in a machine-readable checklist format for fill automation? (Choose two.)A . ARFB . XCCDFC ....

March 17, 2024 No Comments READ MORE +

Which of the following should the company implement to ensure it can meet the computing demand while complying with healthcare standard for virtualization and cloud computing?

A health company has reached the physical and computing capabilities in its datacenter, but the computing demand continues to increase. The infrastructure is fully virtualized and runs custom and commercial healthcare application that process sensitive health and payment information. Which of the following should the company implement to ensure it...

March 17, 2024 No Comments READ MORE +

Which of the following solutions should the network architect implement to meet the requirements?

Documents downloaded from websites must be scanned for malware. Which of the following solutions should the network architect implement to meet the requirements?A . Reverse proxy, stateful firewalls, and VPNs at the local sitesB . IDSs, WAFs, and forward proxy IDSC . DoS protection at the hub site, mutual certificate...

March 17, 2024 No Comments READ MORE +

Which of the following is an appropriate security control the company should implement?

A company suspects a web server may have been infiltrated by a rival corporation. The security engineer reviews the web server logs and finds the following: The security engineer looks at the code with a developer, and they determine the log entry is created when the following line is run:...

March 17, 2024 No Comments READ MORE +